SlideShare une entreprise Scribd logo
1  sur  8
Purpose
This course project is intended to assess your ability to
comprehend and apply the basic concepts related to information
security management, such as the following:
The ability to discern when a risk assessment should be
performed and carrying out the task
Understanding user or customer access requirements, whether
remote or local
Using a layered security approach to establish and maintain
access controls
Working with other departments, such as the human resources
department, to identify and implement methods to prevent
unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information
security domains and others will be evaluated against the
learning objectives as identified and described in previous
lessons of instruction for this course.
Required Source Information and Tools
The following tools and resources will be needed to complete
this project:
Course textbook
Access to the Internet
Access to the library
Text sheet: Integrated Distributors Incorporated
(access_project_ts_integrateddistributors)
Learning Objectives and Outcomes
Successful completion of this project will ensure that you are
capable of supporting the implementation and management of an
information systems security framework. To be able to do so,
you need to be able to do the following:
Relate how an access control policy framework is used to define
authorization and access to an information technology (IT)
infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity,
and availability with sound access controls.
Relate how a data classification standard influences an IT
infrastructure’s access control requirements and
implementation.
Develop an access control policy framework consisting of best
practices for policies, standards, procedures, and guidelines to
mitigate unauthorized access.
Define proper security controls within the User Domain to
mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems
within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through
proper testing and reporting.
Project Checkpoints
The course project has a checkpoint strategy. Checkpoint
deliverables allow you to receive valuable feedback on your
interim work. In this project, you have four ungraded
checkpoint deliverables. (See the syllabus for the schedule.)
You may discuss project questions with the instructor, and you
should receive feedback from the instructor on previously
submitted work. The checkpoint deliverable ensures refinement
of the final deliverables, if incorporated effectively. The final
deliverable for this project is a professional report and a
PowerPoint presentation.
Checkpoint
Purpose of the Checkpoint
Expected Deliverables
1
Understanding requirements
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Prepare an initial outline of issues and potential solutions and
discuss with your instructor, the chief information officer
(CIO).
2
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Prepare an extended outline of issues and potential solutions
and discuss with your instructor, the CIO.
3
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Draft the report and the PowerPoint presentation to discuss with
your instructor, the CIO.
4
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Modify the report and the PowerPoint presentation based on
feedback from your instructor, the CIO.
Deliverables
Introduction
User identification, authentication, and authorization are
essential in developing, implementing, and maintaining a
framework for information system security. The basic function
of an information system security framework is to ensure the
confidentiality and the integrity, as well as the availability of
systems, applications, and data. Certain information security
implementation and management knowledge is required of
network administrators, IT service personnel, management, and
IT security practitioners, such as information security officers,
security analysts, and domain administrators.
Scenario
You are provided with the text sheet entitled Integrated
Distributors Incorporated
(access_project_ts_integrateddistributors.docx) to complete this
project. You play the dual role of an IT architect and IT security
specialist working for Integrated Distributors Incorporated
(IDI), a multi-national organization with offices in several
countries. Your instructor for this course plays the role of the
chief information officer (CIO). Your peers play the role of
selected technology staff. Each of the organization’s locations
is operating with different information technologies and
infrastructure—IT systems, applications, and databases. Various
levels of IT security and access management have been
implemented and embedded within their respective locations.
Tasks
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI
is facing.
Develop plans to implement corporate-wide information access
methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in
the disparate locations where IDI now functions and develop
mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of
IDI.
Address remote user and Web site user’s secure access
requirements.
Develop a proposed budget for the project—consider hardware,
software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining
the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the
learning objectives and your solutions to the issues within the
scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses
important access control, infrastructure, and management
aspects from each location.
Self-Assessment Checklist
I have considered an access control policy framework to define
authorization and access to an IT infrastructure for compliance
within the course project.
I have considered the influence of the data classification
standard in an IT infrastructure’s access control requirements
and implementation.
I have defined proper security controls within the User Domain
to mitigate risk and threats caused by human nature and
behavior.
I have developed and implemented an effective plan to mitigate
risks to an IT infrastructure’s confidentiality, integrity, and
availability with sound access controls.
I have developed an access control policy framework consisting
of best practices for policies, standards, procedures, and
guidelines to mitigate unauthorized access.
I have implemented appropriate access controls for information
systems within IT infrastructures.
I have followed the submission requirements and necessary
details for writing the report

Contenu connexe

Similaire à PurposeThis course project is intended to assess your abilit

CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docxrtodd599
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1IIUI
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networksRaja Waseem Akhtar
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxbradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxdeanmtaylor1545
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life CycleChristina Padilla
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docxoswald1horne84988
 
You are provided with the text sheet entitled Integrated Distributor
You are provided with the text sheet entitled Integrated DistributorYou are provided with the text sheet entitled Integrated Distributor
You are provided with the text sheet entitled Integrated Distributorruthannemcmullen
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 

Similaire à PurposeThis course project is intended to assess your abilit (20)

CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Object oriented analysis and design unit- i
Object oriented analysis and design unit- iObject oriented analysis and design unit- i
Object oriented analysis and design unit- i
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
You are provided with the text sheet entitled Integrated Distributor
You are provided with the text sheet entitled Integrated DistributorYou are provided with the text sheet entitled Integrated Distributor
You are provided with the text sheet entitled Integrated Distributor
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 

Plus de TakishaPeck109

Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docxUnit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docxTakishaPeck109
 
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docxUnit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docxTakishaPeck109
 
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docxUnit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docxTakishaPeck109
 
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docxUnit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docxTakishaPeck109
 
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docxUnit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docxTakishaPeck109
 
Unit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docxUnit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docxTakishaPeck109
 
Unit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docxUnit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docxTakishaPeck109
 
Unethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docxUnethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docxTakishaPeck109
 
Unifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docxUnifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docxTakishaPeck109
 
Understanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docxUnderstanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docxTakishaPeck109
 
Understanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docxUnderstanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docxTakishaPeck109
 
Understanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docxUnderstanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docxTakishaPeck109
 
Understanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docxUnderstanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docxTakishaPeck109
 
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docxUnderstanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docxTakishaPeck109
 
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docxUNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docxTakishaPeck109
 
Understanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docxUnderstanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docxTakishaPeck109
 
Understanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docxUnderstanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docxTakishaPeck109
 
Understand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docxUnderstand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docxTakishaPeck109
 
Under the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docxUnder the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docxTakishaPeck109
 
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxTakishaPeck109
 

Plus de TakishaPeck109 (20)

Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docxUnit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
 
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docxUnit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
 
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docxUnit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docx
 
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docxUnit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
 
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docxUnit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
 
Unit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docxUnit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docx
 
Unit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docxUnit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docx
 
Unethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docxUnethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docx
 
Unifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docxUnifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docx
 
Understanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docxUnderstanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docx
 
Understanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docxUnderstanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docx
 
Understanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docxUnderstanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docx
 
Understanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docxUnderstanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docx
 
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docxUnderstanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
 
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docxUNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
 
Understanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docxUnderstanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docx
 
Understanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docxUnderstanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docx
 
Understand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docxUnderstand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docx
 
Under the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docxUnder the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docx
 
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
 

Dernier

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Dernier (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

PurposeThis course project is intended to assess your abilit

  • 1. Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: The ability to discern when a risk assessment should be performed and carrying out the task Understanding user or customer access requirements, whether remote or local Using a layered security approach to establish and maintain access controls Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools The following tools and resources will be needed to complete this project: Course textbook
  • 2. Access to the Internet Access to the library Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors) Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following: Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation. Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior. Implement appropriate access controls for information systems
  • 3. within IT infrastructures. Mitigate risks from unauthorized access to IT systems through proper testing and reporting. Project Checkpoints The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation. Checkpoint Purpose of the Checkpoint Expected Deliverables 1 Understanding requirements Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for
  • 4. completion Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO). 2 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO. 3 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO.
  • 5. 4 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO. Deliverables Introduction User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators. Scenario You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this
  • 6. project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. Tasks Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining
  • 7. the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location. Self-Assessment Checklist I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project. I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation. I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior. I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. I have implemented appropriate access controls for information systems within IT infrastructures.
  • 8. I have followed the submission requirements and necessary details for writing the report